QUICK LINKS

Newly Launched Trainings

...Critical Infrastructure Security..
This training is focused on providing guidelines for establishing secure industrial control systems (ICS). SCADA, DCS, various control system configurations such as PLC, etc., are commonly found in ICS sectors. Safety and reliability are the two important factors to ensure secure operations of an ICS system. To properly address these two factors along with ‘security’ as the key functional element, ‘Critical Infrastructure Security’ course was developed as it is essential to know the threats possessed to an ICS environment and how to evaluate and mitigate risks to the ICS.

...Exploiting IoT 3 Days..
"Exploiting IoT" is a unique course designed to offer you the ability to evaluate the security of these smart devices. This course is ideal for those wanting to understand the security issues associated with IoT and enabling them to make better decisions when building, deploying and assessing IoT technologies

...Exploiting IoT 5 Days..
"Exploiting IoT" is a unique course designed to offer you the ability to evaluate the security of these smart devices. This course is ideal for those wanting to understand the security issues associated with IoT and enabling them to make better decisions when building, deploying and assessing IoT technologies

...PE • APT & Malwares...
This course introduces the concept of malware, how they function, their types and how they are extensively used in Advanced Persistent attacks (APT's) to siphon off the critical business information from an organization on regular basis. We start off with the concepts of Process explorer, disassembling v/s debugging with advanced debugging features. We also set breakpoints to crack down an application dissecting it to the level where malware code is present.

...Thread Modelling• Forensics & APTs...
This course puts forward the security concepts taking real time examples, practical hands on approach on how the "bad guys" infiltrate our system and also how do we implement defense strategies, incident response and countermeasures.

...PE • APT & Malwares...
This course introduces the concept of malware, how they function, their types and how they are extensively used in Advanced Persistent attacks (APT's) to siphon off the critical business information from an organization on regular basis. We start off with the concepts of Process explorer, disassembling v/s debugging with advanced debugging features. We also set breakpoints to crack down an application dissecting it to the level where malware code is present.

...Reversing .NET applications • delphi applications...
Reverse engineering is the process of discovering the technological principles of a device, object, or system through analysis of its structure, function, and operation. This allows us to visualize the software’s structure, its operations, and the features that drive its behavior. The techniques of analysis, and the application of automated tools for software examination, give us a reasonable way to comprehend the complexity of the software and to uncover its truth.

Compliance Trainings

...What is HIPAA • Examples of PHI...
• What is HIPAA • Why compliance to HIPAA is important • Examples of PHI • When is health information considered identifiable • What are permitted uses of PHI
• HIPAA rules • Do’s and Don’ts • HIPAA violations